Code integrity

Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2018
0246819872018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Parallax is a novel self-contained code integrity verification approach, that protects instructions by overlapping Return… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2013
2013
Low-level inlined reference monitors weave monitor code into a program for security. To ensure that monitor code cannot be… (More)
  • figure 1
  • figure 2
  • table 1
  • table 3
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… (More)
Is this relevant?
2009
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.5
  • table I
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
In a large distributed system such as the Grid, ensuring data integrity is of particular importance. Since in a same network… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?